Mostrar el registro sencillo del ítem

Artículo

dc.creatorVarela Vaca, Ángel Jesúses
dc.creatorMartínez Gasca, Rafaeles
dc.date.accessioned2022-11-22T11:49:32Z
dc.date.available2022-11-22T11:49:32Z
dc.date.issued2013
dc.identifier.citationVarela Vaca, Á.J. y Martínez Gasca, R. (2013). Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach. Information and Software Technology, 55 (11), 1948-1973. https://doi.org/10.1016/j.infsof.2013.05.007.
dc.identifier.issn0950-5849es
dc.identifier.issn1873-6025es
dc.identifier.urihttps://hdl.handle.net/11441/139673
dc.description.abstractContext: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, and hence the potential cost and consequences of the materialization of threats could produce catastrophic loss for organizations. Therefore, the early selection of security controls that miti-gate risks is a real and important necessity. Nevertheless, there exists an enormous range of IT security controls and their configuration is a human, manual, time-consuming and error-prone task. Furthermore, configurations are carried out separately from the organization perspective and involve many security stakeholders. This separation makes difficult to ensure the effectiveness of the configuration with regard to organizational requirements. Objective: In this paper, we strive to provide security stakeholders with automated tools for the optimal selection of IT security configurations in accordance with a range of business process scenarios and orga-nizational multi criteria. Method: An approach based on feature model analysis and constraint programming techniques is pre-sented, which enable the automated analysis and selection of optimal security configurations. Results: A catalogue of feature models is determined by analyzing typical IT security controls for BPMSs for the enforcement of the standard goals of security: integrity, confidentiality, availability, authorization, and authentication. These feature models have been implemented through constraint programs, and Con-straint Programming techniques based on optimized and non-optimized searches are used to automate the selection and generation of configurations. In order to compare the results of the determination of configuration a comparative analysis is given. Conclusion: In this paper, we present innovative tools based on feature models, Constraint Programming and multi objective techniques that enable the agile, adaptable and automatic selection and generation of security configurations in accordance with the needs of the organization.es
dc.description.sponsorshipJunta de Andalucía P08-TIC-04095es
dc.description.sponsorshipMinisterio de Educación y Ciencia TIN2009-13714es
dc.formatapplication/pdfes
dc.format.extent26es
dc.language.isoenges
dc.publisherElsevieres
dc.relation.ispartofInformation and Software Technology, 55 (11), 1948-1973.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectBusiness processes
dc.subjectBusiness process management systemses
dc.subjectSecurityes
dc.subjectRisk treatmentes
dc.subjectConstraint programminges
dc.subjectFeature modeles
dc.titleTowards the automatic and optimal selection of risk treatments for business processes using a constraint programming approaches
dc.typeinfo:eu-repo/semantics/articlees
dc.type.versioninfo:eu-repo/semantics/submittedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticoses
dc.relation.projectIDP08-TIC-04095es
dc.relation.projectIDTIN2009-13714es
dc.relation.publisherversionhttps://www.sciencedirect.com/science/article/pii/S0950584913001286?via%3Dihubes
dc.identifier.doi10.1016/j.infsof.2013.05.007es
dc.contributor.groupUniversidad de Sevilla. TIC-258: Data-centric Computing Research Hubes
dc.journaltitleInformation and Software Technologyes
dc.publication.volumen55es
dc.publication.issue11es
dc.publication.initialPage1948es
dc.publication.endPage1973es
dc.contributor.funderJunta de Andalucíaes
dc.contributor.funderMinisterio de Educación y Ciencia (MEC). Españaes

FicherosTamañoFormatoVerDescripción
Towards the automatic and optimal ...6.996MbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional